Stop the war!
Остановите войну!
for scientists:
default search action
SEC 2023: Poznan, Poland
- Norbert Meyer, Anna Grocholewska-Czurylo:
ICT Systems Security and Privacy Protection - 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14-16, 2023, Revised Selected Papers. IFIP Advances in Information and Communication Technology 679, Springer 2024, ISBN 978-3-031-56325-6 - Sven Zemanek, Sebastian Tauchert, Max Jens Ufer, Lilli Bruckschen:
Web Content Integrity: Tamper-Proof Websites Beyond HTTPS. 1-14 - Hiroaki Kikuchi:
Privacy-Preserving Clustering for Multi-dimensional Data Randomization Under LDP. 15-29 - Tino Jungebloud, Nhung H. Nguyen, Dong Seong Kim, Armin Zimmermann:
Hierarchical Model-Based Cybersecurity Risk Assessment During System Design. 30-44 - Peter Hamm, Sebastian Pape, Kai Rannenberg:
The Influence of Privacy Concerns on Cryptocurrency Acceptance. 45-58 - Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquín García-Alfaro:
Automated Enrichment of Logical Attack Graphs via Formal Ontologies. 59-72 - August See, Tatjana Wingarz, Matz Radloff, Mathias Fischer:
Detecting Web Bots via Mouse Dynamics and Communication Metadata. 73-86 - Jun Xu, Shengnan Zhao, Chuan Zhao, Zhenxiang Chen, Zhe Liu, Liming Fang:
Practical Single-Round Secure Wildcard Pattern Matching. 87-101 - Sigurd Eskeland, Svetlana Boudko:
Efficient Non-interactive Anonymous Communication. 102-116 - Mengqing Yang, Chunxiao Ye, Yuanmu Liu, Yan Jin, Chunming Ye:
PointPuff: An Ed25519 Optimization Implementation. 117-130 - Maximilian Wittig, Dogan Kesdogan:
Detecting Web Tracking at the Network Layer. 131-148 - Christos Karapapas, George C. Polyzos, Constantinos Patsakis:
What's Inside a Node? Malicious IPFS Nodes Under the Magnifying Glass. 149-162 - George Kornaros, Georgia Berki, Miltos D. Grammatikakis:
Quantum-Secure Communication for Trusted Edge Computing with IoT Devices. 163-176 - Hannes Holm, Jenni Reuben:
Evaluation of a Red Team Automation Tool in Live Cyber Defence Exercises. 177-190 - Almamy Touré, Youcef Imine, Thierry Delot, Antoine Gallais, Alexis Semnont, Robin Giraudo:
Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe. 191-206 - Jinfeng Chen, Hua Wu, Suyue Wang, Guang Cheng, Xiaoyan Hu:
An Accurate and Real-Time Detection Method for Concealed Slow HTTP DoS in Backbone Network. 207-221 - Aikaterini Soumelidou, Aggeliki Tsohou:
Towards an Information Privacy Competency Model for the Usage of Mobile Applications. 222-235 - Pascal Wichmann, August See, Hannes Federrath:
SecPassInput: Towards Secure Memory and Password Handling in Web Applications. 236-249 - Efstratios Chatzoglou, Vyron Kampourakis, Georgios Kambourakis:
Bl0ck: Paralyzing 802.11 Connections Through Block Ack Frames. 250-264 - David A. Cordova Morales, Ahmad Samer Wazan, David W. Chadwick, Romain Laborde, April Rains Reyes Maramara, Kalil Cabral:
Enhancing the ACME Protocol to Automate the Management of All X.509 Web Certificates. 265-278 - Janaka Senanayake, Sampath Rajapaksha, Naoto Yanai, Chika Komiya, Harsha Kalutarage:
MADONNA: Browser-Based MAlicious Domain Detection Through Optimized Neural Network with Feature Analysis. 279-292 - Lukás Sadlek, Pavel Celeda:
Cyber Key Terrain Identification Using Adjusted PageRank Centrality. 293-306 - Dominik Soukup, Daniel Uhrícek, Daniel Vasata, Tomás Cejka:
Machine Learning Metrics for Network Datasets Evaluation. 307-320 - Vanessa Bracamonte, Sebastian Pape, Sascha Löbner:
Factors of Intention to Use a Photo Tool: Comparison Between Privacy-Enhancing and Non-privacy-enhancing Tools. 321-334 - Anting Lu, Hua Wu, Hao Luo, Guang Cheng, Xiaoyan Hu:
Real-Time Platform Identification of VPN Video Streaming Based on Side-Channel Attack. 335-349 - Qisheng Chen, Kazumasa Omote:
Toward the Establishment of Evaluating URL Embedding Methods Using Intrinsic Evaluator via Malicious URLs Detection. 350-360 - Kodai Hatakeyama, Daisuke Kotani, Yasuo Okabe:
Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication. 361-375
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.